Game model for detecting cross-layer attacks in wireless ad hoc networks

被引:0
作者
Wang J. [1 ]
Liu X. [1 ]
Jiang S. [1 ]
机构
[1] College of Electronic Science and Technology, National University of Defense Technology, Changsha
来源
Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology | 2022年 / 44卷 / 01期
关键词
Cross-layer attack; Game theory; Wireless ad hoc networks;
D O I
10.11887/j.cn.202201017
中图分类号
学科分类号
摘要
Compared with single-layer attacks, cross-layer attacks in wireless ad hoc networks can better conceal attack behavior, achieve better attack effects, or reduce the cost of attack. In order to detect cross-layer attacks in wireless ad hoc networks, a detection model based on game theory was proposed. As the attack will inevitably affect the parameters of each protocol layer, the corresponding strategy matrix and payoff matrix was built from the aspect of attack-defense game of protocol layer, and the mixed strategy Nash equilibrium solution was obtained by equilibrium analysis. Simulation experiments results show that the detection system adopting mixed strategy can achieve a better detection performance and save the energy consumption significantly, compared with the traditional detection system. © 2022, NUDT Press. All right reserved.
引用
收藏
页码:114 / 121
页数:7
相关论文
共 25 条
[1]  
WOOD A D, STANKOVIC J A., Denial of service in sensor networks, Computer, 35, 10, pp. 54-62, (2002)
[2]  
RAYMOND D R, MARCHANY R C, BROWNFIELD M I, Et al., Effects of denial-of-sleep attacks on wireless sensor network MAC protocols, IEEE Transactions on Vehicular Technology, 58, 1, pp. 367-380, (2009)
[3]  
RADOSAVAC S, CARDENAS A A, BARAS J S, Et al., Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: robust strategies against individual and colluding attackers, Journal of Computer Security, 15, pp. 103-128, (2007)
[4]  
KARLOF C, WAGNER D., Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Networks, 1, pp. 293-315, (2003)
[5]  
RADOSAVAC S, BENAMMAR N, BARAS J., Cross-layer attacks in wireless ad hoc networks, Proceedings of Conference on Information Science and Systems, pp. 1266-1271, (2004)
[6]  
BIAN K G, PARK J M, CHEN R L., Stasis trap: cross-layer stealthy attack in wireless ad hoc networks, Proceedings of IEEE Global Telecommunications Conference, (2006)
[7]  
NAGIREDDYGARI D, THOMAS J., MAC-TCP cross-layer attack and its defense in cognitive radio networks, Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 71-78, (2014)
[8]  
WANG W K, SUN Y, LI H S, Et al., Cross-layer attack and defense in cognitive radio networks, Proceedings of IEEE Global Telecommunications Conference, (2010)
[9]  
HOSSAIN M, XIE J., Off-sensing and route manipulation attack: a cross-layer attack in cognitive radio based wireless mesh networks, Proceedings of IEEE Conference on Computer Communications, pp. 1376-1384, (2018)
[10]  
HASAN K, SHETTY S, OYEDARE T., Cross layer attacks on GSM mobile networks using software defined radios, Proceedings of 14th IEEE Annual Consumer Communications & Networking Conference, pp. 357-360, (2017)